Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
derived using » delivery using (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
derived using » delivery using (Expand Search)
-
121
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
122
Faces in the crowd
Published 2017“…In the disk dimension problem, we are given a planar graph G, and seek the least number k for which G embeds in the plane minus k open disks, with every vertex on the boundary ofsome disk. Useful properties of graphs with bounded disk dimension are derived. …”
Get full text
Get full text
Get full text
conferenceObject -
123
Mechanical perturbation control of cardiac alternans
Published 2018“…Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. To this end, a bidirectional coupling between the membrane voltage and active tension systems in a single cardiac cell is provided, and a discrete form of the proposed control algorithm, that can be incorporated in the coupled maps, is derived. …”
Get full text
article -
124
Performance Prediction Using Classification
Published 2019“…The use of classification as a data mining approach for performance prediction has been studied by many eminent researchers. …”
Get full text
-
125
-
126
Adaptive STATCOM Control for a Multi-machine Power System
Published 2020“…Synchronous static compensator (STATCOM) can be used to improve the dynamic performance of a power system. …”
Get full text
article -
127
A new minimum curvator multi-step method for unconstrained optimization
Published 1998“…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …”
Get full text
Get full text
Get full text
conferenceObject -
128
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017Get full text
Get full text
Get full text
conferenceObject -
129
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…Monte-Carlo simulations are performed to validate the derived analytical results and compared with the existing works.…”
-
130
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…In this paper, an enhanced binary version of the Rat Swarm Optimizer (RSO) is proposed to deal with Feature Selection (FS) problems. FS is an important data reduction step in data mining which finds the most representative features from the entire data. …”
-
131
A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System
Published 2023“…We show the CmOBL-AO algorithm to perform better than the differential evolution algorithm, gravitational search algorithm, African vultures optimization, and the Aquila Optimizer using well-known unimodal, multimodal benchmark functions. …”
Get full text
-
132
A Robust Approach for Enhanced Autonomous Robot Navigation
Published 2024Get full text
doctoralThesis -
133
Improving the security of SNMP in wireless networks
Published 2017“…The two keys used for encryption and authentication are derived from the shared password between the manager and agent. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
134
Implementation of trust region methods in optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis -
135
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
136
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
Published 2024“…The performance of our approach is gauged against the traditional multi-label Naïve Bayes (MLNB) algorithm and is quantified through a suite of evaluation metrics. …”
-
137
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
Published 2020“…Based on the proposed algorithm, several IPT systems are optimized in MATLAB software using Genetic Algorithm (GA). …”
-
138
-
139
A cluster-based model for QoS-OLSR protocol
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
140
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
Published 2022“…The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …”